Advances in Cryptology – ASIACRYPT 2011

17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings

  • Dong Hoon Lee
  • Xiaoyun Wang
Conference proceedings ASIACRYPT 2011

DOI: 10.1007/978-3-642-25385-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7073)

Table of contents (40 papers)

  1. Front Matter
  2. Lattices and Quantum Cryptography

    1. BKZ 2.0: Better Lattice Security Estimates
      Yuanmi Chen, Phong Q. Nguyen
      Pages 1-20
    2. Functional Encryption for Inner Product Predicates from Learning with Errors
      Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan
      Pages 21-40
    3. Random Oracles in a Quantum World
      Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry
      Pages 41-69
  3. Public Key Encryption I

    1. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
      Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud
      Pages 70-88
    2. Structure Preserving CCA Secure Encryption and Applications
      Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens
      Pages 89-106
    3. Decoding Random Linear Codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)
      Alexander May, Alexander Meurer, Enrico Thomae
      Pages 107-124
    4. Lower and Upper Bounds for Deniable Public-Key Encryption
      Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi
      Pages 125-142
  4. Public Key Encryption II

    1. Bridging Broadcast Encryption and Group Key Agreement
      Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferrer, Oriol Farràs
      Pages 143-160
    2. On the Joint Security of Encryption and Signature, Revisited
      Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson
      Pages 161-178
    3. Polly Cracker, Revisited
      Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret
      Pages 179-196
  5. Database Privacy

    1. Oblivious RAM with O((logN)3) Worst-Case Cost
      Elaine Shi, T. -H. Hubert Chan, Emil Stefanov, Mingfei Li
      Pages 197-214
    2. Noiseless Database Privacy
      Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta
      Pages 215-232
  6. Hash Function

    1. The Preimage Security of Double-Block-Length Compression Functions
      Frederik Armknecht, Ewan Fleischmann, Matthias Krause, Jooyoung Lee, Martijn Stam, John Steinberger
      Pages 233-251
    2. Rebound Attack on JH42
      María Naya-Plasencia, Deniz Toz, Kerem Varici
      Pages 252-269
    3. Second-Order Differential Collisions for Reduced SHA-256
      Alex Biryukov, Mario Lamberger, Florian Mendel, Ivica Nikolić
      Pages 270-287
    4. Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions
      Florian Mendel, Tomislav Nad, Martin Schläffer
      Pages 288-307
  7. Symmetric Key Encryption

    1. Cryptanalysis of ARMADILLO2
      Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner
      Pages 308-326
    2. An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware
      Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann
      Pages 327-343
    3. Biclique Cryptanalysis of the Full AES
      Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
      Pages 344-371

About these proceedings


This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011.
The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.


cryptanalysis cryptography hash functions reliable communication verifiable secret sharing

Editors and affiliations

  • Dong Hoon Lee
    • 1
  • Xiaoyun Wang
    • 2
  1. 1.Center for Information Security TechnologiesKorea UniversitySeoulSouth Korea
  2. 2.Shandong UniversityChina

Bibliographic information

  • Copyright Information International Association for Cryptologic Research 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25384-3
  • Online ISBN 978-3-642-25385-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349